DOI QR코드

DOI QR Code

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin (Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications) ;
  • Chen, Mingkai (Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications) ;
  • Wei, Xin (Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications) ;
  • Li, Haibo (Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications)
  • Received : 2019.10.24
  • Accepted : 2020.02.24
  • Published : 2020.05.31

Abstract

With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

Keywords

1. Introduction

With the rapid spread of intelligence terminals, we have experienced explosive growth of communication capacity in wireless system especially in the past ten years[1]. Naturally, the fact poses a serious challenge to the improvement of local area services. Traditional cellular communication can not meet the emerging demands in future. As the key solution in 5G network, device-to-device(D2D) communication can achieve high-rate transmission of reusing licensed spectrum resource from cellular communication without accessing in base station[2]. It can both ease the traffic burden and enhance the spectrum utilization. Thanks to these advantages, D2D communication has gained more attention in the investigation of local area service[3].

Despite the fact that D2D communication can improve the system performance by reusing licensed spectrum resource, the resource allocation for the network also influences the system performance adversely. Therefore, how to ensure the transmission need of different D2D links is a quite significant project in resource allocation. Several schemes were discussed in the previous work. Xu et al. accomplished resource allocation based on implementing a reverse iterative combinatorial auction [4]. Nguyen et al. improved the effect of resource allocation by adjusting the transmission power and removing the interference by pricing scheme [5]. These studies either focus on increasing the throughput of the network or minimize the mutual interference. However, they are lack of consideration about the influence from the social ties between mobile users [6] [7]. Since the device does not signify as a smart phone, it also means the manners of mobile users share resource in the network.

It is seen that social connection among mobile users in D2D communication can severely affect transmission performance and provide the motivation that users may assist each other. From the aspect of offloading, social-aware approach is quite different from a conventional context-unaware approach [8][9]. Therefore, how to leverage the social characteristics plays a key role on designing effective resource allocation proposal. And maximizing energy-efficiency can be formulated between D2D and cellular users(CUs) by considering their priorities based on social-aware virtual MAC protocol [10]. In the dynamic situation,relay selection and management are reviewed with social awareness-aided spectrum-power trading in cooperative D2D communications [11] [12]. Moreover, social-aware user connection performance is integrated by the average link rate and the social reciprocity, and stimulates mutual cooperation to ensure D2D content sharing [13]. However, none of these literature mentions how social attribute to impact on the access of D2D communication. And it is a significant issue to maximize the joint social and physical benefits in the network.

Based on the crucial problem mentioned above, we attempt to combine social ties and physical connection to optimize performance of the network, especially the social-aware throughput. Therefore, in this paper, our contribution is that we combine the social and physical network to highlight the influence of social-tier on resource allocation among users inD2D networks. Firstly, in order to jointly consider the social attributes and physical proximity to D2D underlay communication network, we measure the social graph and physical graph quantitatively and propose a weighted-interference minimizing oriented cluster formation scheme to guarantee the system performance. Next, inspired by the matching theory [14] [15], we propose a stable rate-maximizing based on matching algorithm to accomplish theone-to-one matching between cellular users and D2D pairs. Finally, the result demonstrates that our proposed scheme acquires quite well clustering effect and increases the overall transmission rate greatly compared to the other leading-edge schemes.

The reminder of this paper is organized as follows. Firstly, we have listed the related work in this field and classified to the different types, in Section II. We introduce the system model in Section III. Then, we propose our weighted-interference minimizing oriented cluster formation scheme and stable rate-maximizing based matching algorithm in Section IV. Then, in Section V, Simulation result and analysis are given, and finally we conclude the paper in Section VI.

2. Related Work

We survey the literature on social-aware D2D communication, such as social content sharing,social-aware resource allocation, social-aware relay selection.

Social Content Sharing. Social network has tremendously changed content sharing. In this network, every user equipment(UE) is smart to determine which content to provide or cache and to share their own social characteristics. By taking wireless features, social characteristics and device intelligence into account, these works formulate an optimization problem by integrating power control, mode selection, mobility and incentive mechanism to achieve a proactive caching or content replication [13], [16]-[19]. All contents are managed in content-centric mode, where users can send their interests to obtain content with naming information, resulting in a reduction of network traffic load [17]. Perhaps, the authors introduce the notation of social selfishness from social knowledge to represent the social-aware rate and achieve an effective cooperation together [19]. However, the social content sharing does not consider the transmission issue in the D2D communication. They all assume the D2D communication can initiate without influence of the physical layer all based on social characteristics, which are not actual.

Social-aware Resource Allocation. The existing social-aware resource allocation approaches have considered physical domain constraints and social domain factors, which should result in effective D2D links among users' willing to share interests, which are called social-aware resource allocation. Moreover, knowledge of social characteristics derived from social network may play a key role in D2D multicast by sufficiently utilizing both the physical and social properties of users [20]. Due to the user selfishness, the authors can use the game theory to maximize the user's utilities and decide whether to opportunistically share the content with another user [21]. In [22], the authors discuss the domain of D2D communication with respect to social-aware resource allocation and optimization. Then, the authors devise a taxonomy and outline the key requirements to enable social-aware resource allocation. And then, some literature [23] [24] has debated the social-aware resource allocation between D2Dcommunication and communities. They exploit social ties to enhance D2D resource sharing or channels sharing among a group of people.

Social-aware Relay Selection. Employment of social-aware D2D relay communications also has been studied in amounts of literatures. In [25], the authors formulate a problem of social-aware D2D relay selection and propose a two-stage D2D selection scheme. Moreover, the relay selection is related to energy efficiency and mobility [26] [27], which exploits social ties in human social networks to enhance cooperative D2D communications. Moreover, leveraging social trust, the researchers also focus on social-aware energy-efficient relay selection mechanism, which gives the reason why the user serves the other users in the network.

Summary. All of these research are built on social network and interference control. For example, content sharing establishes on a stable relationship and reliable transmission link. Resource allocation serves for the reliable transmission link and also reduces the interference between the links. Relay communication may bring more D2D interference in the network, but we should cut down the influence of this issue. Since interference control is the basis of these studies, we should bring the social attributes into channel control in order to reduce the interference in the transmission. Hence, in this paper, we focus on the social-aware interference control to solve the problem.

3. System Model

3.1 System Overview 

We consider a D2D-assisted small cell network (SCN), consisting of random-located access point (AP) and C mobile users, denoted as the set of {C|c∈ 1,2, …C} . Mobile users which are in physical and social proximity form as D D2D pairs{Dd | d ∈ 1,2, … D} . These D2D pairs can implement D2D communication by reusing the licensed spectrum resource for traditional cellular communication. Besides, there are a set of orthogonal subcarriers for uplink transmission which are labelled as Bk ,{Bk |k ∈ 1, 2,…,K } , and D2Dtransmitter can choose power level from the set of{Pl |l  =1 ,2,… ,L } . In our investigation,we are tending to depict the content sharing mechanism with two-dimension architecture in details as illustrated in Fig. 1. As shown in Fig. 1, we know the system includes the two different domains, social domain and the physical domain. The social domain can lead the physical domain to alter and optimize the performance in the physical layer. It may modify the related parameters, like power and channel, to satisfy the social requirements.

E1KOBZ_2020_v14n5_1984_f0001.png 이미지

Fig. 1. Illustration of social-aware D2D system

3.2 Interference Graph Formation

In the physical domain, base station (BS) connects to the AP via a high speed wired link or backhaul link. AP can acquire numerous data resources from BS and easily deliver to mobile users via cellular communication. It is said that if AP and all mobile users are perfectly synchronized the users can access to core network with a very high speed. There exist two kinds of wireless data transmission path in the SCN: the ordinary paths between the source AP to the destination mobile users and the D2D path between condition-enabled users. For the reason of spectrum reusing, unbearable interference is induced into network inevitably. Besides, the degree of interference derives from proximity between users. The closer users geographically are, the more severe interference they would mutually cause. Therefore, we depict the interference graph depending on the network topology.

We consider a typical scene consisting of cellular communication link and D2Dcommunication link dominated by the AP. We construct an undirected weighted interference graph gia,b = (N, εia,b) . Thereinto, the vertex set N denotes arbitrary cellular links or D2Dlinks in the cell, the edge set εia,b denotes the weighted potential mutual interference between the two vertices a and b . To simplify the interference graph, we assume that BS assigns equal transmitted power pt for each uplink cellular communication and all the D2Dtransmitters hold the same maximum power level p maxD with efficient energy. Different from the interference graph proposed for resource allocation problem in [17], we have to announce the resource selection list Bk ,{Bk |k ∈ 1, 2 ,… ,K} firstly. For example, when ki and kj are prone to establish an communication links, an channel state information will be sent to BS,and BS replies with the channel estimation information, then ki calculates signal interference plus noise ratio(SINR) when certain indices of Bk is chosen. As a result, the interference link varies depending on the channel response toward different RBs. With more reasonable consideration, we weight the mutual interference between vertex ki and kj as Is = Ikikj+Ikjki . Note that there is no interference when D2D communication implements on separate channels.

Based on the channel estimation information provided by the BS, we can calculate  I s as follows:

\(I_{s}\left(\mathrm{~B}_{1}, \ldots, \mathrm{B}_{\mathrm{k}}\right)=\left\{\begin{array}{l} p_{t} g_{k_{i}, k_{j}}\left(\mathrm{~B}_{1}, \ldots, \mathrm{B}_{\mathrm{k}}\right), k_{i} \in C, k_{j} \in D \\ p_{l} g_{k_{i}, k_{j}}\left(\mathrm{~B}_{1}, \ldots, \mathrm{B}_{\mathrm{k}}\right), k_{i}, k_{j} \in D \end{array}\right.\)       (1)

3.3 Social Graph Formation

On one hand, people in close proximity geographically are more willing to share information with each other. On the other hand, a group of friends, students in the same class or employees in the same company also have common interests. In the social domain, users with high trust can choose his D2D pair to exchange appointed content within the community S . Since the mobile users are anonymous and have different interests, it influences how mobile users access to networks. Thus, social attributes have influence on resource allocation strategy greatly. So it is necessary to maintain a record of user's relations with each other. For this purpose, we introduce social graph gsa,b = (N,εsa,b) to exhibit the social connection between mobile users where the edge set, εsa,b denotes the weighted social ties between two vertices a and b. The value of social ties reflects the strength of social relationship between users.

For most of realistic social networks which hold explicit weight for a pair of vertices, we define, εa = ∑εsa,b as total strength of weight of users a and ωa,b as the transmission possibility of random vertices in the social graph. Inspired by the contact-based epidemic spreading model illustrated in [16], we are tending to depict the content propagation process as a two-state model. It denotes that all of the users in the spreading model are divided into two states: Susceptible (S) and Infected (I). The content sharing mechanism can be summarized as follows: user a initially holds the common interested content shares the content with probability ωa,b to user b at susceptible state by λ trials. In this process, the contact possibility ωa,b can be expressed as follows.

\(\omega_{a, b}=1-\left(1-\frac{\varepsilon_{a, b}}{\varepsilon_{a}}\right)^{\lambda}\)       (2)

With dynamic content sharing processing, we can divide the situation into two different cases from the scope of epidemiological model: the contact process (CP) and the reactive process (RP). The most obvious difference between the two cases is existing only one individual stochastic contact per unit time in CP, while all the users can be candidates to provide the content.

In traditional investigation, the object function is typically modeled as the minimization problem of mutual interference. We use weighted interference to evaluate the influence of social ties on our network. Compared to the average occasion, D2D links with high contact probability ωa,b implicit heavy transmission tasks usually. And it presents a strict requirement for D2D transmitter. Naturally, accumulated interference may bring congestion accordingly. Taking social tier into consideration, we are tending to present a social weighted interference model. In this model, we define the weighted social interference for each cellular-D2D reusing pair expressed as:

\(I_{n}\left(B_{1}, \ldots B_{k}\right)=I_{s}\left(B_{1}, \ldots B_{k}\right)+\omega_{a, n} I_{a}\left(B_{1}, \ldots B_{k}\right)\)       (3)

We can easily find that weighted interference consists of two parts: the interference aroused by cellular communication and potential interference induced by the associated D2D links. The latter part is evidently constraint to the contact possibility ωa,b.

3.4 Problem Formulation

After building the model of network, we attempt to give the problem that we concern on. We define gd as the channel gains among the D2D links and gc,d as the interference channel gains from Cc and Dd. In addition, gc,AP denotes the interference channel gain between Cc and AP and gd,AP denotes the interference channel gain between Dd to AP. Thus, SNIR of Cc to AP is

\(\Gamma_{a, b}^{C}=\frac{p_{t} g_{c, A P}}{p_{l} g_{d, A P}+N_{0}}\)       (4)

where N0 is the noise power of the channel. 

Then, SINR of Dd in each cluster is

\(\Gamma_{a, b}^{D}=\frac{p_{l} g_{n_{\%} }}{p_{t} g_{c, d}+N_{0}}\)       (5)

Therefore, the achievable transmission rate of cellular user Cc, the achievable transmission rate of Dd whose spectrum resources is provided by the cellular users Cc is given respectively as:

\(R_{a, b}^{C}=\log _{2}\left(1+\Gamma_{a, b}^{C}\right)\)       (6)

\(R_{a, b}^{D}=X_{c, d} \cdot \log _{2}\left(1+\Gamma_{a, b}^{D}\right)\)       (7)

where Xc,d = [Xc,d]CxD denotes a binary set which records the reuse relationships between the cellular user Cc and D2D links Dd.

Our objective is to maximize the system throughput while guarantee the normal communication demand, so the optimization problem can be formulated as following:

\(\begin{array}{c} \arg \max \sum_{i=1}^{C} \sum_{j=1}^{D} R_{i, j} \\ \text { s.t } \mathrm{C}_{1}: \mathrm{R}_{\mathrm{i}, \mathrm{j}}=\mathrm{R}_{i, j}^{C}+x_{i, j} R_{i, j}^{D} \\ \mathrm{C}_{2}: 0 \leq p_{l} \leq p_{\max ^{D}} \\ \mathrm{C}_{3}: x_{i, j}=\{0,1\} \\ \mathrm{C}_{4}: \sum_{i=1}^{C} x_{i, j} \leq 1, \forall j \in D \end{array}\)       (8)

where C1 indicates that the system throughput is related to the resource allocation strategy and the channel gains of the cellular communication. C2 indicates that the transmission power level of each D2D transmitter is below the maximum value pmaxD. C3 and C4 restrict that one D2D links can reuse spectrum resource from only one cellular user.

4. Cluster Formation and Matching Theory Based Resource Allocation

In this section, we tend to solve the optimization problem depicted in (8). To maximize the sum rate of the D2D-enabled cluster, we attempt to propose a reasonable strategy for spectrum allocation based on the cluster formation in SCN. Firstly, we calculate the social and physical attitude of users in the network and divide the user into different cluster. Secondly, we define the different probability of D2D communication as different price. When user launches the certain D2D communication, it should pay equivalent price to borrow the resource block (RB) from CUs. Finally, we should match the D2D users and CU in the same channel in order to maximize the transmission rate, so we can calculate the throughput of the whole network.

4.1 Cluster Formation

For simplicity, we assume there is only one AP in SCN and we also think the AP can only disseminate content toward a single community. The original intention of cluster formation is to avoid the situation that mobile users with strong social connection form high-interference link in SCN. As a result, those links will reduce system throughout greatly. We propose a spectral clustering scheme to refine different communities into several clusters, which involves the following steps. The example in Fig. 2 show the basic idea of the scheme.

E1KOBZ_2020_v14n5_1984_f0002.png 이미지

Fig. 2. Illustration of cluster formation

Step 1: For the community S, the user n% that introduces minimal interference to AP can be selected as the source node in the community if the qualification can be met. That is the total strength of social relationship between users exceed the average level εn%. When users only have social relationship, they can establish D2D link. It means user trusts the other users so that they can communicate with each other.

Step 2: We define the transition probability matrix as P(1×N) = a,b]•ωa,b represents the possibility of the establishment of D2D link between users a and b. Steming from the source node n%, if and only if the following two conditions are satisfied, the candidate nodes can be added into the cluster M1 ( n%). After certain users join the cluster, the weighted interference is below the weighted interference threshold. Otherwise, M1 (n%) ∈ Cc. The searching process ends when all the nodes are traversed.

step 3: The set S=S-M1 (n%) repeats the operation from Step 1 ~ Step 2 among the other nodes until all the social clusters M = (M1 (n%), M2 (n%), ..., Mn (n%)) accomplish. 

The detail of cluster formation is indicated in Algorithm I.

It is worth to mention that we set restrictions for the cluster formation processing as the number of the final-formed cluster can't exceed L to guarantee N − 2D × L≥ 2 in Step 2. In other words, one D2D pair has at least one resource reusing choice to select according to the restrictions.

4.2 Price Strategy

As BS plays as a role of dominator in SCN. When BS assigns a resource block to the D2D pair, the cellular users will suffer interference at the same time. To acquire considerable system throughout and prevent CUs from severe interference, BS should charge the D2D links with different “price” as they competing for the spectrum resource selfishly. In particular, the function for charging price γ can be expressed as

\(\gamma=x+y \cdot B_{k}^{\alpha}, k \in 1,2, \ldots, K,\)         (9)

where x,y,α are non-negative constant. And we assume α ≥ 0 to guarantee the price function convex. Besides, Bk represents the sub-bandwidth allocated to the k- th D2D pair. The aim of establishing price set is to make up the interference caused by D2D transmission.

4.3 Matching Algorithm 

In this section, we propose a distributed algorithm based on matching theory to resolve the allocation problem. We put forward to basic concept in matching theory firstly. Then we establish the preference set from the perspective of maximizing the throughput. In this process,price strategy is similar to bargaining in game theory, which is introduced to avoid the occurrence of multiple reuse scenarios. At the same time, corresponding algorithm is listed in details.

1) Matching preference establishment

The basic concept of matching theory elaborates the preference correlation of finite set M = (m1, m2,...mn) towards another finite preference set W = (w1, w2,...wn). Preference means the priorities of selections while we choose from the set of W . The premise definitely exists at least a favorite choice in W for each elements mi in W. To illustrate, we assume mi has two alternative selections w1 and w2 in preference set. If mi prefers w1 to w2, it means the priorities of w1 is higher than w2. Learning from the basic concept of matching theory, we can give some definitions in our investigation:

Definition: T = (T1, T2, ..., Tn) denotes the set of D2D pairs towards resource block list Bk•Ti denotes the set of preference selections of D2D pair which can be expressed as 1× K matrix T1xK = (T1, T2, ..., Tn)1xK, k = 1, 2, ...K. To sum up, the sum set of all D2D pairs can be expressed as a matrix, which is 0-1 matrix:

\(T_{N \times K}=\left(\begin{array}{ccc} T_{1,1} & \ldots & T_{1, k} \\ \mathrm{M} & \mathrm{O} & \mathrm{M} \\ T_{n, 1} & \mathrm{~L} & T_{n, k} \end{array}\right).\)       (10)

As we establish the preference set to maximize throughput, we denotes the rate set is corresponding to the set Ti as follows with the premise of all of the constraints:

\(U=\left(\begin{array}{ccc} U_{1,1} & \ldots & U_{1, k} \\ \mathrm{M} & \mathrm{O} & \mathrm{M} \\ U_{n, 1} & \mathrm{~L} & U_{n, k} \end{array}\right).\)       (11)

It is important to note that we restrict one D2D cluster can reuse the spectrum resources from at most one CU. As a result, the sum of rows and columns of TNxK should meet the constraints: . Hence, there are k strategies of spectrum allocation and the element Un is corresponding to the weighted sum rate of each allocation strategies. The preference list of D2D pairs towards different cellular users can be obtained by solving the optimization problem in (8). Back to the matching theory, we define the preference set O1xK = (O1, O2, ..., On)NxK by descending order. According to the obtained preference set, we propose a matching algorithm based on the Definition above in details.

2) Resource Allocation Matching Algorithm

By exploiting the established preference set, we tend to design a distributed resource allocation matching algorithm. Before that, we consider the situation that several D2D pairs request for the same resource blocks occupied by the same cellular users. Because of the centralized property of BS, it will distribute "price" for different resource band when these bands are requested by different D2D pairs. By taking the pricing operation of AP into consideration, we explain the procedure of our proposed matching algorithm as follows:

Step 1. First of all, we utilize the concept of price cost to reuse RBs in CUs. Let \(\gamma_{n \times k}=\left(\gamma_{n, k}\right)_{n=1, k=1}^{n=N, k=K}\) represents the price cost when D2D pair k reuse RB occupied by the cellular users n . γn,k represents the cost generated by per bit rate associating with AP and bandwidth. The expression of price cost can be acquired from (9). 

Step 2. For D2D pairs, each D2D pair can determine its most preferable RBs according to the preference set ONxK. For cellular users k, if there exists only one D2D pair which is willing to reuse RB belonging to cellular users k, BS will allow the associated link directly. But in more common situation, there exist several requests of D2D pairs for the spectrum resource from the cellular users. By considering the definition of price cost illustrated in Step 1, we can measure the price cost of each request and determine which D2D pair is chosen as the candidate. Each step of iteration results in a CU-D2D pair. The iteration ends when there is no request from D2D pairs or the qualification N - 2D x L ≥ D in SCN. 

Step 3. After the operation in Step 1 and Step 2, the output yields to the whole matching decision of CU-D2D pairs. And we based on the decision to establish the communication network topology in the cellular network. 

These above steps provide a basic idea of stable rate-maximization matching (SRM) algorithm for our D2D communication underlay cellular network. The detail of the algorithm is elaborated in Algorithm II

4.4 Analysis of Stability and Optimality

In this section, we provide imperative analysis to prove the stability and optimality of our proposed algorithm as an one-to-one matching. 

1) Stability

Theorem 1: There always exists a stable matching scheme no matter what the pattern of preference list is. 

Proof: According to Definition in Section IV-C, we assume a arbitrary preference list ONxK = (O1, O2, ..., On,k)NxK, it means cellular user k is the most preferable choice for D2D pairs n . Each cellular user which receives more than one resource request will refuses all but its most preferable D2D pairs as candidates. Those rejected in the first stage will send proposal towards their second preferable choice. Then, cellular user chooses their favorite choice among new proposal and candidate derived in the former stage. This process will repeat in the same manner. 

In at most n- 2n + 2 iterations, cellular user will have received one proposal at least. For the reason that one D2D pairs can only request for the resource from the same cellular user no more once, every cellular users will ends in an CU-D2D pairs in peri time. If n < k, the matching process will end when all of the cellular users have been requested. If n n > k, it will end when all of D2D pairs have been chosen for candidates or been rejected by the cellular users. Thanks to the symmetry of the candidate of users, it will bring out a stable set of matching list in the end. 

2) Optimality 

Theorem 2: Every stable matching assignment is optimal under the SRM algorithm. 

Proof: Assuming that in certain point, cellular users c1, having received several request from a set of better-qualified candidate d1, d2, ..., dα but reject D2D pairs dβ. In such situation, we can conclude that each di prefers c1 than all the others and 1 c prefers each di than dβ. Note that we denote di as dβ and di respectably. In addition, we have to request for a less preferable cellular user for spectrum resource. But this assignment is not stable for the reason that it can not benefit the throughput at the utmost extend. Hence, the assignment is unstable and dβ can not establish link with c1 . The assumption shows that our matching algorithm only refuses the request which is impossible to be admitted into a stable assignment. So the result of assignment is always optimal.

5. Simulation Results and Discussion

In this section, we provide the simulation results to illustrate the performance of our proposed SRM algorithm. Main parameters have been given in Table 1. In physical domain, the simulation scenario is restricted within a 500*500m area. The radius of D2Dcommunication is 50m. The channel fading is -20. And the noise power is 9dBm at each user device. The power of transmission is 23dBm. Moreover, the interference threshold is 5.6 x 10-6W, which means the communication interrupt when interference is higher than this value[29]. In social domain, we utilize the explicit weighted signed directed network -Bitcoin Alpha to evaluate the trust degree between the nodes. All of the nodes are distributed randomly in the coverage of the physical domain. Both path loss model and shadow fading are taken into account in cellular and D2D links. Utility function maximization(UFM) and optimal social-community aware resource allocation(OSRA) are used for comparison [30].

Table 1. Applications in each class

E1KOBZ_2020_v14n5_1984_t0001.png 이미지

Fig. 3 shows the result of the cluster formation based on the spectrum clustering algorithm. From the result, we can observed that mobile users which satisfy the requirement of minimizing the weighted interference can form the cluster to exchange information directly. Thanks to the reason for considering the social and physical factor synthetically, we find proximity users geographically will not be classified into the same cluster in some situation. In certain degree, it reflects the reliability of our proposed cluster formation algorithm.

E1KOBZ_2020_v14n5_1984_f0003.png 이미지

Fig. 3. Result of cluster formation

Fig. 4 and Fig. 5 compare the sum rate of the three algorithm under the isolated scenarios, in which D2D communication can only implement within the same cluster. We set the number of cluster as N=3 and clustering coefficient as σ = 0.1. In the network, we cut the association between different cluster to avoid the appearance of interference-unbearable link, we can observe that significant performance enhancement can be achieved when cellular users are relatively sufficient. But when we change the weighted-interference threshold, the number of D2D pairs changes accordingly. When cellular users are not sufficient, performances of SRM and UFM are roughly equal. The reason is that it lacks enough cellular users to provide sufficient spectrum resource, when the threshold is easy to meet. Hence, the interference within the network increases dramatically. As a result, the advantage of our proposed algorithm is not evident. But in general, the proposed scheme outperforms than the other two averagely

E1KOBZ_2020_v14n5_1984_f0004.png 이미지

Fig. 4. Comparison of sum rate for different resource allocation algorithms, when the number of D2D users increases

E1KOBZ_2020_v14n5_1984_f0005.png 이미지

Fig. 5. Comparison of sum rate for different resource allocation algorithms, when the number of cellular users increases

For the service latency, we compare the SRM to UFM and OSRA. The simulation results are shown in the Fig. 6 and Fig. 7. When the number of cellular users increases, the total service latency in the system decreases and SRM has better performance than the other scheme. Moreover, UFM scheme has the most influence according to the cellular users. Our proposed scheme SRM has a little improvement than OSRA, which is because we estimate the social value more accurately. Next, when the number of D2D users increases in Fig. 7, the total service latency has some difference from Fig. 6. The D2D users have reduced the more latency than cellular users, which is reasonable, because D2D is an end-to-end communication. And there are a little reduction between the three scheme.

E1KOBZ_2020_v14n5_1984_f0006.png 이미지

Fig. 6. Comparison of service latency for different resource allocation algorithms, when the number of cellular users increases

E1KOBZ_2020_v14n5_1984_f0007.png 이미지

Fig. 7. Comparison of service latency for different resource allocation algorithms, when the number of D2D users increases

In Fig. 8, we have presented the relationship between interference and social utility. While the number of D2D users remains the same, the cellular users have achieved the more interference in the network, when the channels are congested. However, it drops pointedly and trend to a smooth and steady situation. Note that the social utility is only related to D2D users, so that the curve is steady. Meanwhile, it does not fluctuate very much. As shown in Fig. 9, the throughput of cellular network increases based on cellular users and it is almost a liner function. But the throughput of D2D network also stays a steady status, which means the interference of cellular users do not reduce the D2D transmission rate. Moreover, the D2D user has maintained the good social connection in the network.

E1KOBZ_2020_v14n5_1984_f0008.png 이미지

Fig. 8. Discussion of interference in the system

E1KOBZ_2020_v14n5_1984_f0009.png 이미지

Fig. 9. Analysis of throughput for different modes in the system

6. Conclusions and Future Work 

In this paper, we propose a social-aware resource allocation scheme in the underlay D2D communication system based on the realistic social network. By combining the social and physical characteristics, we divide the community into several clusters. We also refer to matching theory and design a rate-maximization oriented SRM resource allocation algorithm. Through the simulation result, we have demonstrated the effectiveness of our proposed SRM algorithm, suggesting that our proposed social-aware scheme is more suitable for future joint resource allocation scenarios. 

Acknowledgements 

This work is partly supported by the National Natural Science Foundation of China (61571240, 61671253, 61901227); the major projects of the Natural Science Foundation of the Jiangsu Higher Educations Institutions (16KJA510004, 19KJB510049); the Postdoctoral Science Foundation of China (Grant No.2017M611881); the National Engineering Research Center of Communications and Networking (Nanjing University of Posts and Telecommunications (Grant No.TXKY17003); Innovation Program of Postgraduate Research in Jiangsu Province (KYCX19_0889), Scientific Research Foundation of NUPT (NY218011, NY220007).

References

  1. L. Zhou, D. Wu, X. Wei, and Z. Dong, "Seeing Isn't Believing: QoE Evaluation for Privacy-Aware Users," IEEE Journal on Selected Areas in Communications, vol. 37, no. 7, pp. 1656-1665, July 2019. https://doi.org/10.1109/jsac.2019.2916452
  2. T. O. Olwal, K. Djouani and A. M. Kurien, "A Survey of Resource Management Toward 5G Radio Access Networks," IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 1656-1686, third quarter 2016. https://doi.org/10.1109/COMST.2016.2550765
  3. M. Jo, T. Maksymyuk, B. Strykhalyuk and C. Cho, "Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing," IEEE Wireless Communications, vol. 22, no. 3, pp. 50-58, June 2015. https://doi.org/10.1109/MWC.2015.7143326
  4. C. Xu et al., "Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 348-358, Sept. 2013. https://doi.org/10.1109/JSAC.2013.SUP.0513031
  5. L. Zhou, D. Wu, J. Chen, and Z. Dong, "Greening the Smart Cities: Energy-Efficient Massive Content Delivery via D2D Communications," IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp.1626-1634, April 2018. https://doi.org/10.1109/tii.2017.2784100
  6. L. Zhou, D. Wu, J. Chen, and Z. Dong, "When Computation Hugs Intelligence: Content-Aware Data Processing for Industrial IoT, " IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1657-1666, June 2018. https://doi.org/10.1109/jiot.2017.2785624
  7. E. Ahmed, I. Yaqoob, A. Gani, M. Imran and M. Guizani, "Social-Aware Resource Allocation and Optimization for D2D Communication," IEEE Wireless Communications, vol. 24, no. 3, pp. 122-129, June 2017. https://doi.org/10.1109/MWC.2017.1600087WC
  8. O. Semiari, W. Saad, S. Valentin, M. Bennis and H. V. Poor, "Context-Aware Small Cell Networks: How Social Metrics Improve Wireless Resource Allocation," IEEE Transactions on Wireless Communications, vol. 14, no. 11, pp. 5927-5940, Nov. 2015. https://doi.org/10.1109/TWC.2015.2444385
  9. F. Wang, Y. Li, Z. Wang and Z. Yang, "Social-Community-Aware Resource Allocation for D2D Communications Underlaying Cellular Networks," IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3628-3640, May 2016. https://doi.org/10.1109/TVT.2015.2450774
  10. B. Fan, H. Tian, L. Jiang and A. V. Vasilakos, "A Social-Aware Virtual MAC Protocol for Energy-Efficient D2D Communications Underlying Heterogeneous Cellular Networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8372-8385, Sept. 2018. https://doi.org/10.1109/tvt.2018.2846811
  11. Y. Gao, Y. Xiao, M. Wu, M. Xiao and J. Shao, "Dynamic Social-Aware Peer Selection for Cooperative Relay Management With D2D Communications," IEEE Transactions on Communications, vol. 67, no. 5, pp. 3124-3139, May 2019. https://doi.org/10.1109/tcomm.2019.2894138
  12. Y. Li, Z. Zhang, H. Wang and Q. Yang, "SERS: Social-Aware Energy-Efficient Relay Selection in D2D Communications," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5331-5345, June 2018. https://doi.org/10.1109/tvt.2018.2810162
  13. D. Wu, L. Zhou, Y. Cai and Y. Qian, "Optimal Content Sharing Mode Selection for Social-Aware D2D Communications," IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 910-913, Dec. 2018. https://doi.org/10.1109/LWC.2018.2836446
  14. Y. Gu, Y. Zhang, M. Pan and Z. Han, "Matching and Cheating in Device to Device Communications Underlying Cellular Networks," IEEE Journal on Selected Areas in Communications, vol. 33, no. 10, pp. 2156-2166, Oct. 2015. https://doi.org/10.1109/JSAC.2015.2435361
  15. D. Wu, L. Zhou, Y. Cai, H. Chao and Y. Qian, "Physical-Social-Aware D2D Content Sharing Networks: A Provider-Demander Matching Game," IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7538-7549, Aug. 2018. https://doi.org/10.1109/tvt.2018.2825366
  16. H. Hu, Y. Wen, T. Chua, J. Huang, W. Zhu and X. Li, "Joint Content Replication and Request Routing for Social Video Distribution Over Cloud CDN: A Community Clustering Method," IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 7, pp. 1320-1333, July 2016. https://doi.org/10.1109/TCSVT.2015.2455712
  17. Z. Su, Y. Hui and S. Guo, "D2D-based content delivery with parked vehicles in vehicular social networks," IEEE Wireless Communications, vol. 23, no. 4, pp. 90-95, August 2016. https://doi.org/10.1109/MWC.2016.7553031
  18. Z. Wang, L. Sun, M. Zhang, H. Pang, E. Tian and W. Zhu, "Propagation- and Mobility-Aware D2D Social Content Replication," IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1107-1120, April 2017. https://doi.org/10.1109/TMC.2016.2582159
  19. D. Wu, L. Zhou and Y. Cai, "Social-Aware Rate Based Content Sharing Mode Selection for D2D Content Sharing Scenarios," IEEE Transactions on Multimedia, vol. 19, no. 11, pp. 2571-2582, Nov. 2017. https://doi.org/10.1109/TMM.2017.2700621
  20. P. Zhao, L. Feng, P. Yu, W. Li and X. Qiu, "A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication," IEEE Access, vol. 5, pp. 15717-15730, 2017. https://doi.org/10.1109/ACCESS.2017.2731805
  21. T. Wang, Y. Sun, L. Song and Z. Han, "Social Data Offloading in D2D-Enhanced Cellular Networks by Network Formation Games," IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 7004-7015, Dec. 2015. https://doi.org/10.1109/TWC.2015.2463281
  22. E. Ahmed, I. Yaqoob, A. Gani, M. Imran and M. Guizani, "Social-Aware Resource Allocation and Optimization for D2D Communication," IEEE Wireless Communications, vol. 24, no. 3, pp. 122-129, June 2017. https://doi.org/10.1109/MWC.2017.1600087WC
  23. Y. Zhao, Y. Li, Y. Cao, T. Jiang and N. Ge, "Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks," IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6621-6634, Dec. 2015. https://doi.org/10.1109/TWC.2015.2457427
  24. F. Wang, Y. Li, Z. Wang and Z. Yang, "Social-Community-Aware Resource Allocation for D2D Communications Underlaying Cellular Networks," IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3628-3640, May 2016. https://doi.org/10.1109/TVT.2015.2450774
  25. K. Wu, M. Jiang and H. Tan, "D2D Relay Selection Based on Joint Fuzzy and Entropy Theories With Social Similarity," IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8796-8807, Sept. 2018. https://doi.org/10.1109/tvt.2018.2848544
  26. Y. Gao, Y. Xiao, M. Wu, M. Xiao and J. Shao, "Dynamic Social-Aware Peer Selection for Cooperative Relay Management With D2D Communications," IEEE Transactions on Communications, vol. 67, no. 5, pp. 3124-3139, May 2019. https://doi.org/10.1109/tcomm.2019.2894138
  27. X. Chen, B. Proulx, X. Gong and J. Zhang, "Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case," IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp. 1471-1484, Oct. 2015. https://doi.org/10.1109/TNET.2014.2329956
  28. Y. Li, Z. Zhang, H. Wang and Q. Yang, "SERS: Social-Aware Energy-Efficient Relay Selection in D2D Communications," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 5331-5345, June 2018. https://doi.org/10.1109/tvt.2018.2810162
  29. H. Hu, Y. Wen, H. Luan, T. Chua and X. Li, "Toward Multiscreen Social TV with Geolocation-Aware Social Sense," IEEE Multimedia, vol. 21, no. 3, pp. 10-19, July-Sept. 2014. https://doi.org/10.1109/mmul.2014.2
  30. M. Chen, L. Wang, J. Chen, X. Wei and L. Lei, "A Computing and Content Delivery Network in the Smart City: Scenario, Framework, and Analysis," IEEE Network, vol. 33, no. 2, pp. 89-95, March/April 2019. https://doi.org/10.1109/mnet.2019.1800253